Sciweavers

166
Voted
SADFE
2008
IEEE
15 years 6 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
SADFE
2008
IEEE
15 years 6 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
95
Voted
SADFE
2008
IEEE
15 years 6 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
IMF
2008
15 years 1 months ago
Reconstructing People's Lives: A Case Study in Teaching Forensic Computing
Abstract: In contrast to the USA and the UK, the academic field of forensic computing is still in its infancy in Germany. To foster the exchange of experiences, we report on lesson...
Felix C. Freiling, Thorsten Holz, Martin Mink
SADFE
2008
IEEE
15 years 6 months ago
Protecting Digital Legal Professional Privilege (LPP) Data
To enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) docume...
Frank Y. W. Law, Pierre K. Y. Lai, Zoe L. Jiang, R...
Forensic Engineering
Top of PageReset Settings